US7725674B2 - Hard drive eraser - Google Patents
Hard drive eraser Download PDFInfo
- Publication number
- US7725674B2 US7725674B2 US11/583,150 US58315006A US7725674B2 US 7725674 B2 US7725674 B2 US 7725674B2 US 58315006 A US58315006 A US 58315006A US 7725674 B2 US7725674 B2 US 7725674B2
- Authority
- US
- United States
- Prior art keywords
- drive
- hard drive
- erase
- data
- hard
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B5/00—Recording by magnetisation or demagnetisation of a record carrier; Reproducing by magnetic means; Record carriers therefor
- G11B5/02—Recording, reproducing, or erasing methods; Read, write or erase circuits therefor
- G11B5/024—Erasing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2143—Clearing memory, e.g. to prevent the data from being stolen
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00666—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a step of erasing or nullifying data, e.g. data being overwritten with a random string
Definitions
- the present invention relates to computer and data security, particularly to an apparatus and method for erasing data contained upon magnetic data storage media.
- data eraser software which is intended to make deleted files unrecoverable as well as eliminate the extraneous data that is created and stored by many applications, especially those involving the Internet.
- Such software is run on the computer containing the hard drive that stores the information to be deleted.
- the software causes an over-write of certain data on the hard drive.
- the computer's BIOS and/or components of the hard drive itself may interfere with the software, preventing complete erasure of data on the hard drive.
- the BIOS of the computer and/or hard drive components may prevent data on certain areas of the hard drive from being erased. Therefore, the data is not securely erased or destroyed and can often be recovered by known forensic data recovery techniques.
- Embodiments provide apparatuses and methods for erasing hard drives.
- a system which can be configured as a stand alone and portable apparatus, includes a control device configured to support an erase module.
- the erase module is configured to erase a hard drive such that data erased from the hard drive is forensically unrecoverable.
- the system further includes a user interface and at least one drive bay configured to provide communication between a hard drive and the control device.
- a hard drive is erased using a low frequency.
- a certificate is generated certifying that a hard drive was erased.
- FIG. 1 is a block diagram illustrating a hard drive erase system according to an exemplary embodiment of the invention
- FIG. 2 is a schematic diagram of a portion of a hard drive
- FIG. 3 is a flow chart illustrating a method for erasing a hard drive according to an exemplary embodiment of the invention.
- FIGS. 4-13 depict structural configurations for a hard drive erase system according to exemplary embodiments of the invention.
- FIG. 1 illustrates a hard drive erase system 100 according to an exemplary embodiment.
- the system 100 is a stand alone system that provides secure erasure capability of hard disk drives.
- the system 100 enables hard disk drives to be erased such that the data selected for erasure is forensically unrecoverable.
- the term forensically unrecoverable means that data is not recoverable by presently used techniques.
- the system 100 includes a control device 120 capable of supporting software applications.
- the device 120 can be a central processing unit, a server, among others.
- the control device 120 supports an erase module 140 .
- the erase module 140 can be one or more computer software program applications for erasing data from storage media.
- the module 140 can include software available from the Magnetic Recording Research Center (MRRC) at the University of California, San Diego, specifically the software titled “HDDErase 2.0 Beta,” among other software applications.
- MRRC Magnetic Recording Research Center
- the control device 120 is in communication with a storage device 122 .
- the storage device can be any form of memory capable of storing electronic data.
- the erase module 140 causes data about each erase procedure to be stored on the storage device 122 . In this manner, the system 100 maintains a log of erase procedures.
- the stored data can include hard drive identification information, such as the drive serial number, the drive manufacture, drive model, drive size; a start date/time stamp; an end date/time stamp; the erasure method; an indication of success or failure; the user who initiated the erase procedure; erase certificates; among others.
- the system 100 also includes a user interface 101 , which enables the user to input information into the system 100 and gain information from the system 100 .
- the user interface 101 is a graphical user interface (GUI).
- GUI graphical user interface
- the user interface 101 can be for example, a display device and keyboard, or a touch screen monitor, among others.
- the system also includes at least one hard drive bay 110 .
- the system 100 includes a plurality of hard drive bays 110 .
- Each bay 110 can be populated with at least one hard drive 170 . Accordingly, the system 100 can support the erasure of multiple hard drives 170 simultaneously.
- the drive bays can support at least one type of hard drive 170 , but preferably supports multiple hard drive 170 types.
- Each bay 100 optionally includes a locking mechanism 111 and a status indicator 112 for signaling the status of the hard drive 170 in the bay 110 .
- the control device 120 is in communication with the locking mechanism 111 and is aware of whether the locking mechanism 111 is in a locked or unlocked state.
- the status indicator 112 is shown on the drive bay 110 , status of hard drive 170 in each bay 110 could instead be displayed on the user interface 101 .
- Each drive bay 110 can be operated independently of other drive bays 110 and individual hard drives 170 can be connected and disconnected from the system 100 drive bays 110 without interfering with the operation of other drive bays 110 . Accordingly, the user can remove one hard drive 170 from and connect a hard drive 170 to the system 100 without powering down the system 100 or interrupting an ongoing erase procedure.
- the drive bays 110 enable communication between one or more hard drives 170 and the system 100 such that the system 100 can erase data contained on the hard drive(s) 170 .
- the system 100 can be configured such that the user can access and read the contents of a hard drive 170 that is in a drive bay 110 via the user interface 101 .
- Each drive bay 110 includes at least one connecting device, such as a port, cable, probe, or any device, mechanism or means for establishing communication between system 100 and a hard drive 170 .
- a drive bay 110 includes one or more cables 110 a that connect to a hard drive 170 , e.g., a data cable and a power cable. Other devices and means for providing communication between the system 100 and the hard drive 170 can also be employed.
- the system 100 can accommodate different hard drive 170 types that have differing cabling requirements.
- a drive bay 110 can include a probe 110 b , which attaches to a hard drive 170 at locations other than typical cable attachment locations.
- the probe 110 b can connect to inject a signal the printed circuit board of the hard drive 170 .
- the system 100 is configured to communicate with the hard drive 170 in situ, i.e., as it is found in a particular device, such as a personal computer. It should be understood that the system 100 can include one or more dive bays 110 and also be configured to connect directly to one or more hard drives 170 in situ.
- the system 100 is in communication with an output device 125 for outputting information, such as the status of hard drives 170 and erase certificates, for example by printing, emailing, or other output mechanism.
- the output device is a printer for printing certificates (e.g., in the form of labels) certifying that a particular hard drive 170 has been erased.
- the output device could be integrated with the system 100 .
- the system 100 can be in communication with the Internet 151 or other computer network (not shown).
- the control device 120 can be configured to provide erase certificates and logs to a remote device 150 , such as a computer, which can be part of a computer network controlled by a third party independent of the system 100 user.
- the third party receives erase certificates from a variety of sources, for example, from multiple systems 100 , and stores the erase certificates. In this manner, the third party keeps data regarding hard drive erasures which can be readily accessed as needed.
- FIG. 2 is a schematic diagram of the surface of a storage portion of a hard drive 170 .
- the read/write head moves in the paths or tracks 225 depicted in FIG. 2 .
- the fringes 226 of the tracks 225 may be magnetized to some extent during the data writing process, although the fringes 226 may be magnetized relatively weakly as compared to the central area of the tracks 225 .
- data in the fringes 226 may be incompletely erased by the write-over process. Such incompletely erased data may be recovered with forensic technologies.
- the system 100 enables complete erasure of a hard drive 170 , such that data erased from the drive 170 cannot be forensically recovered.
- the track 225 and fringes 226 are only shown schematically and that there may be relatively gradual rather than sudden transitions between where the tracks 225 (where a write-over is sufficiently complete so that data is unrecoverable) and the fringes 226 ) where data is recoverable due to incomplete write-over).
- the control module 140 provides a “low frequency” write-over of the entire hard drive 170 to be erased.
- the write over may be performed, for example by a software program, such as the HDDErase 2.0 Beta Software.
- the low-frequency is the frequency of the magnetizing electrical current provided to the magnetizing write heads in the hard drive 170 being erased.
- the low-frequency is chosen to be lower than the frequency normally used by the hard drive 170 to write data. As the frequency is lowered, the effective write-over area of the track 225 is widened.
- the low-frequency for a given drive is chosen to be low enough to increase the area of the track 225 so that there are no fringes 226 left with sufficient data that may be forensically recovered, i.e., to completely erase the drive 170 .
- a predetermined number of such write-overs are conducted to erase the drive 170 .
- the user can select the number of write-overs or use a default selection.
- the low-frequency of the write-over depends on the type of hard drive 170 to be erased.
- the low-frequency used is preferably between about 20 Mhz and about 0 Mhz as compared to the normal frequency of about 50 Mhz or greater.
- a frequency of 0 Mhz causes the drive 170 to be overwritten with a DC signal.
- hard drives 170 will not perform a “DC Erase.”
- the erase module causes the hard drive 170 to perform a DC Erase by providing a signal to the hard drive 170 through the printed circuit board (not shown) of the hard drive 170 .
- the module 140 is configured to erase hard drives 170 by a variety of different methods.
- the system can be configured to erase a hard drive 170 using a low-frequency erase procedure as described above and one or more conventional write-over processes, such as multiple write-over procedures or off-track write-over procedures.
- the module 140 copies predetermined files from the hard drive 170 to the storage device 122 , a different hard drive 170 in a different bay 110 , or an external hard drive (not shown). The module 140 then completely erases the drive and replaces the predetermined copied files on the drive.
- the module 140 can also be configured to ghost (i.e., completely copy) a hard drive 170 onto a different hard drive 170 . Further, the module 140 can also be configured to provide post-erase procedures, such as reformatting or repartitioning of the hard drive 170 .
- the module 140 is configured to provide privacy protection erase processes that do not require any data on a hard drive 170 to be read prior to the erase procedure. For this, the module 140 writes sectors of the hard drive 170 with one or more flags (i.e., predetermined data). After the erase procedure is complete, the module 140 reads the previously flagged portions of the drive 170 to ensure that the data was erased. Alternatively, the module 140 could first write over the drive 170 , then perform an erase procedure and then read the drive to ensure that the data was erased. With these procedures, there is no need to read the data originally contained on a hard drive 170 .
- the module 140 could first write over the drive 170 , then perform an erase procedure and then read the drive to ensure that the data was erased. With these procedures, there is no need to read the data originally contained on a hard drive 170 .
- module 140 is configured to provide certificates providing information regarding a hard drive 170 that has been erased or otherwise processed by the system 100 .
- the certificate can contain, for example, hard drive identification information, such as the drive serial number, the drive manufacture, drive model, drive size; a start date/time stamp; an end date/time stamp; the erasure method or procedure conducted (e.g., ghosting, formatting, etc.); an indication of success or failure; the user who initiated the erase procedure; among other information.
- a condition for certification is that the drive bay 110 remains closed and locked for the entire erasure process.
- the certificate can be in any format (e.g., any file format, electronic, printed, among others).
- FIG. 3A illustrates one embodiment of a process for erasing a hard drive 170 using the system 100 ( FIG. 1 ) according to an embodiment of the invention. It should be understood that the sequence of the steps described in connection with FIG. 3A can be altered and additional steps may be added.
- step 201 the system 100 is activated or “booted up” by the user.
- the user Upon system boot, the user is presented with a graphical user interface 101 .
- the user is required to enter login information using the user interface 101 .
- the requirement for login information is particularly useful if use of the system 100 is to be restricted to specific users. Any suitable login scheme can be used, such as a pass code, biometrics, and voice recognition, among others.
- step 202 Upon entering invalid login information in step 202 , the user is prevented from accessing the erase module 140 in step 203 . If the user inputs valid login information in step 202 the user is able to interface with the module 140 at step 204 . Multiple users may have access to the system 100 at a same time.
- the user can begin an erase procedure, view erase logs and certificates stored on the storage device 122 , and manage the system 100 . These procedures will be described in more detail below.
- the user begins an erase procedure at step 205 .
- the user 140 installs a hard drive 170 to be erased and locks the drive bay 110 to which the hard drive 170 was installed.
- the system 100 can be connected to the hard drive 170 in situ.
- the erase module 140 detects that the hard drive 170 is installed and the locking mechanism 111 is in a locked state.
- the user can then select the erase method to be used by inputting information into the user interface 101 .
- the user can accept a default erase method preset in the system 100 .
- the user can also select to have certain files copied from the hard drive 170 to storage device 122 (or a different hard drive 170 in a different bay 110 ), and then replaced on the drive after it is erased, or to have the contents of the hard drive 170 ghosted to the different hard drive 170 .
- the user initiates the erase procedure in step 208 .
- the user may allow the erase procedure to be completed or may terminate the procedure prior to completion.
- the results are stored on the storage device 122 .
- the user selects to receive an erase certificate.
- the certificate is printed in the form of a label to be affixed to the drive 170 .
- the certificate can also be sent in electronic form or other form, to a third party.
- the erase certificate may be sent in electronic form via the Internet 151 to a third party.
- the third party can be a certificate service that will verify the certificate to prove that the hard drive 170 has been successfully or unsuccessfully erased.
- step 213 the user removes the erased hard drive 170 from the drive bay 110 . If the user has printed an erase certificate (e.g., in label form), the user places the erase certificate on the erased hard drive 170 .
- an erase certificate e.g., in label form
- the user can manage the system 100 , including all bays 110 .
- the user can, for example set, or change their own password, select default erase methods for the drive bays 100 , among others.
- the user can also receive updates for the erase module 140 .
- the user can view the system 100 logs and erase certificates.
- the erase module 140 can be configured to enable the user to search the erase logs based on desired search criteria.
- FIG. 3B illustrates a process of using a system 100 having at least first second and third drive bays 110 - 1 , 110 - 2 , 110 - 3 , respectively according to another embodiment of the invention.
- the method depicted in FIG. 3B is particularly useful in forensic applications. If evidence of a crime or event is in the form of a hard drive 170 or data thereon, it is necessary to preserve the hard drive 170 and any data thereon, but it is also desirable to analyze the hard drive 170 and its data without unduly disturbing the evidence and while maintaining a clear chain of custody. A solution is to copy the evidence hard drive to one or more other hard drives that are known to be free of data.
- first and second hard drives 170 - 1 , 170 - 2 are placed in drive bays 110 - 1 , 110 - 2 , respectively.
- the first and second hard drives 170 - 1 , 170 - 2 are securely erased to ensure that no data is present on either drive 170 .
- the erase procedures are certified as described above in connection with step 211 of FIG. 3A .
- step 304 the evidence hard drive 170 - 3 is placed in a third drive bay 110 - 3 .
- the drive is then ghosted to each of the first and second drives 170 - 1 , 170 - 2 in drive bays 110 - 1 , 110 - 2 . That is, all data from the evidence drive is copied to each of the first and second drives 170 - 1 , 170 - 2 in drive bays 110 - 1 , 110 - 2 .
- the evidence drive 170 - 3 the drive is erased securely in step 306 .
- a certificate for this erase procedure and/or ghosting procedure can also be provided in step 307 .
- the evidence drive, whether or not erased, may then be kept by appropriate authorities or returned to its owner.
- the copied first and second drives 170 can be analyzed. Alternatively, if needed, one of the copied hard drives 170 - 1 , 170 - 2 can be stored by appropriate authorities as evidence.
- FIGS. 4-13 depict structural configurations for a hard drive erase system 100 ( FIG. 1 ) according to exemplary embodiments of the invention.
- the system 100 includes a stand alone base apparatus 700 .
- the term stand-alone means that the apparatus 700 is configured to receive or connect to a hard drive 170 such that impediments to data erasure, such as the native device's BIOS, components of the hard drive itself, among others, are avoided.
- the apparatus 700 can receive a hard drive 170 that is normally used with a different device, such as a personal computer (PC) for allowing the PC user functional access to the data.
- the apparatus 700 can be connected to a hard drive 170 in situ in its native device.
- PC personal computer
- the apparatus 700 is physically separate from other apparatuses.
- the apparatus 700 may be physically adjacent to or physically incorporated into another apparatus or device, and may be in communication with another device via the Internet 151 or a computer network.
- the base apparatus 700 can include drive bays 110 , which are accessible via an access means, such as door 705 , an opening, among others.
- an access means such as door 705 , an opening, among others.
- one or more of the drive bays 110 can instead be a connecting means, such as a cable, probe or other device for providing communication between components of the apparatus 700 and the in situ hard drive 170 .
- the apparatus 700 also includes a user interface 101 .
- Hard drives 170 a placed in the apparatus 170 and connected to a connecting device, such as a port, cable, probe, or any device, mechanism or means for establishing communication between system 100 and a hard drive 170 .
- the hard drive 170 is connected such that components that interfere with data erasure of the hard drive 170 are avoided.
- Cable connections 110 a are shown in FIG. 5 as the connecting device, but other connections, such as a probe 110 b , among others, can be used.
- FIG. 5 depicts a more complex embodiment of the system 100 including the base apparatus 700 .
- the additional bays 110 are included in supplemental apparatuses 805 , 806 .
- Supplemental apparatuses 805 , 806 contain drive bays 110 and means for interfacing with the base apparatus 700 (e.g., a port, cable, or any device, mechanism or means for establishing communication between the supplemental apparatus 805 , 806 and base apparatus 700 such that the drive bays 110 of the supplemental apparatus 805 , 806 are in communication with the system 110 ).
- the supplemental apparatuses can be stackable over or under the base apparatus 700 and can be in the form of drawers 805 or a platform 806 .
- FIGS. 6-10 depict a readily portable structural embodiment of the system 100 .
- the system 100 can configured within a single portable base apparatus 1000 .
- FIG. 6 is a front and side view of the apparatus 1000 and
- FIG. 7 is a rear view of the apparatus 1000 .
- the base apparatus 1000 includes an optional handle 1002 ( FIG. 6 ) to promote portability.
- the base apparatus 1000 includes an interface 1156 for a power cord, so that the base apparatus 1000 can be connected to a power source.
- the base apparatus 1000 can also include a rechargeable battery (not shown) to enable use where a power source is not readily available.
- the base apparatus also includes user interface 101 ( FIG. 6 ), which is shown as a touch screen interface.
- the user interface could also be another type of interfaces, such as a screen and keyboard and/or an audio interface.
- the output device 125 is an integrated label printer having a label dispenser 1125 for printing certificates in the form of labels as described above.
- the base apparatus 1000 also includes ports 1155 ( FIG. 7 ) (e.g., USB, ethernet and phone ports) to allow the base apparatus to be connected to the Internet and/or other base apparatuses 1000 or devices.
- the apparatus 1000 also includes drive bays 110 .
- Each drive bay 110 includes an opening 1012 , which is configured to receive a drive module 1100 .
- the drive module 1100 is configured to receive a hard drive 170 .
- FIGS. 8-10 show additional views of the drive module 1100 .
- cables are not needed to provide a connection between hard drives 170 and the system 100 .
- each drive bay 110 includes a port 1010 , shown as a USB port, within the opening 1012 .
- Each drive module 1100 includes a port 1110 configured to connect to the port 1010 of the drive bay 110 .
- each drive module 1100 can be used interchangeably in each of the drive bays 110 . It should be understood that any suitable port or connection providing communication between the drive module 1100 and the drive bay 110 can be used.
- Each drive module 1100 also includes one or more hard drive ports 1160 , 1161 ( FIG. 8 ) configured to receive a hard drive 170 . So that the system 100 can accommodate different types of hard drives 170 , different drive modules 1100 can have different ports 1161 , 1160 suitable for different types of hard drives 170 .
- the one or more ports 1160 , 1161 are provided on an interface board 1166 .
- the interface board 1166 can be removed from the drive module 1100 and replaced with another interface board. This provides a cost reduction as compared to replacing the entire drive module 1100 .
- the drive module 1100 also includes a hard drive support portion 1120 .
- the support portion 1120 serves to stabilize the hard drive 170 when it is connected to the drive module 1100 .
- the support portion 1120 also servers as a guide when the drive module 1100 is placed in a drive bay 110 to ensure that the drive module port 1110 connects to the drive bay port 1010 .
- FIG. 10 depicts a side view of a hard drive 170 connected to a drive module 1100 .
- the support portion is connected to the drive module 1100 by a hinge 1121 . Accordingly, the support portion 1120 can be position in an open position ( FIG. 8 ) or a closed position ( FIG. 9 ). When in a closed position, support portion 1120 covers and protects the ports 1110 , 1160 , 1161 and promotes portability.
- Each drive module 1100 includes a latch 1111 , which activates a locking mechanism 111 , such as a solenoid lock, among others. As shown in FIG. 6 , each drive module 1100 also includes a status indicator 112 . In the embodiment of FIG. 6 , the status indicator includes LEDs of varying colors, which signal the status of the hard drive 170 in the drive bay 110 . For example, green can indicate that a procedure is complete and the hard drive 170 can be removed, while red can indicate that a procedure is in progress and the drive bay 110 should not be opened.
- a drive bay 110 could also be included in a conventional computer device.
- a drive bay 110 including a drive module 1100 , can be provided in a personal computer or other device to enable the device to accommodate various types of hard drives.
- FIGS. 11-13 depict more complex embodiments of the system 100 including the base apparatus 1000 .
- FIG. 11 shows the base apparatus in communication with a laptop computer 1199 (or other personal computer device) and an external hard drive 1198 via ports 1155 ( FIG. 7 ).
- the base apparatus 1000 serves as an external hard drive to the laptop 1199 .
- the external hard drive 1198 can serve as the storage device 122 and/or receive data copied from hard drives 170 within the drive bays 110 .
- FIG. 12 illustrates multiple base apparatuses connected together via ports 1155 ( FIG. 7 ) in a “daisy-chain” manner.
- each apparatus 1000 can function as both a client and a host device.
- an expansion bay 1210 is connected to and in communication with a base apparatus 1000 .
- the expansion bay 1210 includes additional drive bays 110 , which are operated through the base apparatus 1000 to which the expansion bay 1210 is connected.
- FIG. 13 depicts a “hub-and spoke” configuration of apparatuses 1000 .
- the apparatuses 1000 / 1300 that are connected to multiple other apparatuses 1000 serve as a hub for controlling those other apparatuses 1000 .
- FIGS. 4-13 are examples only and other structural configurations are possible. Further, the processes and devices described above illustrate preferred methods and devices of many that could be used and produced. The above description and drawings illustrate exemplary embodiments, which achieve the objects, features, and advantages of the present invention. It is not intended, however, that the present invention be strictly limited to the above-described and illustrated embodiments. Any modifications of the present invention that come within the spirit and scope of the following claims should be considered part of the present invention.
Abstract
Description
Claims (13)
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/583,150 US7725674B2 (en) | 2005-10-20 | 2006-10-19 | Hard drive eraser |
US12/777,321 US20100220572A1 (en) | 2005-10-20 | 2010-05-11 | Hard drive eraser |
US13/525,770 US20120303920A1 (en) | 2005-10-20 | 2012-06-18 | Hard drive eraser |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US72832005P | 2005-10-20 | 2005-10-20 | |
US11/583,150 US7725674B2 (en) | 2005-10-20 | 2006-10-19 | Hard drive eraser |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/777,321 Continuation US20100220572A1 (en) | 2005-10-20 | 2010-05-11 | Hard drive eraser |
Publications (2)
Publication Number | Publication Date |
---|---|
US20070101055A1 US20070101055A1 (en) | 2007-05-03 |
US7725674B2 true US7725674B2 (en) | 2010-05-25 |
Family
ID=37963260
Family Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/583,150 Expired - Fee Related US7725674B2 (en) | 2005-10-20 | 2006-10-19 | Hard drive eraser |
US12/777,321 Abandoned US20100220572A1 (en) | 2005-10-20 | 2010-05-11 | Hard drive eraser |
US13/525,770 Abandoned US20120303920A1 (en) | 2005-10-20 | 2012-06-18 | Hard drive eraser |
Family Applications After (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/777,321 Abandoned US20100220572A1 (en) | 2005-10-20 | 2010-05-11 | Hard drive eraser |
US13/525,770 Abandoned US20120303920A1 (en) | 2005-10-20 | 2012-06-18 | Hard drive eraser |
Country Status (8)
Country | Link |
---|---|
US (3) | US7725674B2 (en) |
EP (1) | EP1952248A4 (en) |
JP (1) | JP2009512968A (en) |
CN (1) | CN101331467A (en) |
CA (1) | CA2666963A1 (en) |
IL (1) | IL190950A0 (en) |
RU (1) | RU2008120022A (en) |
WO (1) | WO2007047802A2 (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080201661A1 (en) * | 2007-02-03 | 2008-08-21 | Stec, Inc. | Remote flash storage management |
US20100262817A1 (en) * | 2009-04-09 | 2010-10-14 | Dell Products L.P. | User selectable data wipe |
US9007961B2 (en) | 2010-11-22 | 2015-04-14 | May Patents Ltd. | Apparatus and method for using and solving linear programming problem and applications thereof |
US9454355B2 (en) | 2010-07-15 | 2016-09-27 | Dell Products L.P. | Information handling system image restoration |
Families Citing this family (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8793457B2 (en) * | 2007-01-22 | 2014-07-29 | International Business Machines Corporation | Method and system for policy-based secure destruction of data |
JP4937863B2 (en) * | 2007-09-05 | 2012-05-23 | 株式会社日立製作所 | Computer system, management computer, and data management method |
DE102008012199A1 (en) * | 2008-03-03 | 2009-09-17 | Weber, Christof | Data media e.g. hard disk, erasing device, has insert elements provided for receiving data media in fiber channel and small computer system interface formats, and controllers for simultaneous controlling of different data medium types |
GB2470198A (en) * | 2009-05-13 | 2010-11-17 | Evidence Talks Ltd | Digital forensics using a control pod with a clean evidence store |
US8832459B2 (en) * | 2009-08-28 | 2014-09-09 | Red Hat, Inc. | Securely terminating processes in a cloud computing environment |
US8554741B1 (en) | 2010-06-16 | 2013-10-08 | Western Digital Technologies, Inc. | Timeline application for log structured storage devices |
CN103164341B (en) * | 2012-07-04 | 2016-08-03 | 北京安天电子设备有限公司 | The quickly method and system of file in erasing mass-memory unit |
JP2014206967A (en) * | 2013-03-18 | 2014-10-30 | 株式会社Genusion | Storage device |
US9396359B2 (en) * | 2013-09-09 | 2016-07-19 | Whitecanyon Software, Inc. | System and method for encrypted disk drive sanitizing |
US9244627B2 (en) * | 2013-10-15 | 2016-01-26 | Synetic Technologies, Inc. | Secure data erasure system for erasing a plurality of data storage devices |
US9363085B2 (en) * | 2013-11-25 | 2016-06-07 | Seagate Technology Llc | Attestation of data sanitization |
CN103793299B (en) * | 2014-02-18 | 2015-10-21 | 重庆爱思网安信息技术有限公司 | A kind of evidence obtaining all-in-one |
CN103956172B (en) * | 2014-03-28 | 2017-11-07 | 华为技术有限公司 | Hard disk and its demagnetization method and degaussing gear |
US20150309754A1 (en) * | 2014-04-24 | 2015-10-29 | Michael Smithwick | System and Method for Erasing Data on an Electronic Device |
US9763895B2 (en) | 2014-08-02 | 2017-09-19 | Heart Healthy Spirits, LLC | Tincture for infusing flavonoids and methods of use |
US9358216B2 (en) | 2014-08-02 | 2016-06-07 | Heart Healthy Spirits, LLC | Tincture for infusing resveratrol and methods of use |
US9971899B2 (en) | 2016-01-04 | 2018-05-15 | International Business Machines Corporation | Secure, targeted, customizable data removal |
CN105824577B (en) * | 2016-03-10 | 2018-09-28 | 福州瑞芯微电子股份有限公司 | It is a kind of to optimize the method and system wiped safely |
GB2559398A (en) * | 2017-02-04 | 2018-08-08 | PQ Solutions Ltd | Controlled and verifiable information destruction |
CN108335694B (en) | 2018-02-01 | 2021-10-15 | 北京百度网讯科技有限公司 | Far-field environment noise processing method, device, equipment and storage medium |
US11113227B2 (en) * | 2019-04-10 | 2021-09-07 | Steven Bress | Erasing device for long-term memory devices |
Citations (34)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4494156A (en) * | 1982-05-14 | 1985-01-15 | Media Systems Technology | Selectable format computer disk copier machine |
US4932522A (en) | 1989-09-21 | 1990-06-12 | Milovich Steven L | CD storage with automatic opening device |
US4984225A (en) | 1987-03-31 | 1991-01-08 | Kabushiki Kaisha Toshiba | System for applying magnetic field to opto-magnetic memory |
US5056081A (en) | 1990-01-02 | 1991-10-08 | Tandy Corporation | System and method for erasing light-responsive optical disks |
US5206843A (en) | 1990-07-31 | 1993-04-27 | Kabushiki Kaisha Toshiba | Apparatus for erasing information recorded on an information recording medium by applying light and a magnetic field over a plurality of recording tracks |
US5375243A (en) * | 1991-10-07 | 1994-12-20 | Compaq Computer Corporation | Hard disk password security system |
JPH08129864A (en) * | 1994-10-28 | 1996-05-21 | Meisei Electric Co Ltd | Loading structure and device structure for equipment unit |
US5652695A (en) * | 1995-05-05 | 1997-07-29 | Dell Usa, L.P. | Hard drive carrier design permitting floating retention of a connector assembly to facilitate blind mating of the connector assembly in a hard drive bay |
USD382861S (en) * | 1996-03-15 | 1997-08-26 | Micronet Technology, Inc. | Housing for removable computer storage modules |
US5721665A (en) | 1995-08-18 | 1998-02-24 | Data Security, Inc. | Modulated magnet field bulk degaussing system |
US6070228A (en) * | 1997-09-30 | 2000-05-30 | International Business Machines Corp. | Multimedia data storage system and method for operating a media server as a cache device and controlling a volume of data in the media server based on user-defined parameters |
US6076142A (en) * | 1996-03-15 | 2000-06-13 | Ampex Corporation | User configurable raid system with multiple data bus segments and removable electrical bridges |
US6131141A (en) | 1996-11-15 | 2000-10-10 | Intelligent Computer Solutions, Inc. | Method of and portable apparatus for determining and utilizing timing parameters for direct duplication of hard disk drives |
US6142796A (en) * | 1999-06-08 | 2000-11-07 | Behl; Sunny | Collapsible hard disk drive docking adapter |
US20010051963A1 (en) * | 2000-03-22 | 2001-12-13 | Shinichi Nishikawa | Network print system |
US6351374B1 (en) * | 1996-08-19 | 2002-02-26 | Raymond C. Sherry | Removable hard disk drive module |
US20020042919A1 (en) * | 2000-05-25 | 2002-04-11 | Sturza Mark Alan | Method for utilizing excess communications capacity |
US20020078026A1 (en) * | 2000-12-14 | 2002-06-20 | Fergus Joseph E. | Method and apparatus for bulk data remover |
US20020112034A1 (en) * | 2001-02-11 | 2002-08-15 | Ulrich Feik | Method for administering certification data |
US20020129257A1 (en) * | 2001-03-07 | 2002-09-12 | Diebold, Incorporated | Automated transaction machine digital signature system and method |
US20020196572A1 (en) * | 2001-06-21 | 2002-12-26 | Steven Bress | Systems and methods for removing data stored on long-term memory devices |
US20030074576A1 (en) * | 2001-10-17 | 2003-04-17 | Kelly Thomas W. | Positive disconnect device for networked computer |
US6570727B1 (en) | 1997-04-30 | 2003-05-27 | International Business Machines Corporation | Method and apparatus for erasing information from a disk within a magnetic disk drive using an externally generated magnetic field |
US20030103288A1 (en) * | 2001-11-30 | 2003-06-05 | Kabushiki Kaisha Toshiba | Recording and regeneration apparatus and data erasure method for use in the recording and regeneration apparatus |
US6651192B1 (en) | 2000-11-30 | 2003-11-18 | Western Digital Technologies, Inc. | Method and system for testing reliability attributes in disk drives |
US20040051989A1 (en) | 2002-09-17 | 2004-03-18 | Fujitsu Limited | Data erasing device using permanent magnet |
US20040252628A1 (en) | 2003-03-18 | 2004-12-16 | Roger Detzler | Dead on demand disk technology |
US20050082182A1 (en) | 2003-10-15 | 2005-04-21 | Mcbrady Mark S. | Storage device for compact disk box |
US20050141118A1 (en) | 2002-03-14 | 2005-06-30 | Tomoaki Ito | Recorded data deleting device for hard disk |
US20050200885A1 (en) * | 2004-02-26 | 2005-09-15 | Matsushita Electric Industrial Co., Ltd. | Multifunction apparatus |
US20050219732A1 (en) | 2002-12-09 | 2005-10-06 | Orient Instrument Computer Co., Ltd. | Device and method for erasing recorded data of magnetic storage |
US20050237563A1 (en) * | 2004-04-21 | 2005-10-27 | Sharp Kabushiki Kaisha | Data processing apparatus and image forming apparatus |
US20060023389A1 (en) | 2002-12-09 | 2006-02-02 | Tomoaki Ito | Recorded data erasing device of magnetic storage |
US7027249B2 (en) | 2003-08-20 | 2006-04-11 | Fujitsu Limited | Data erasing apparatus |
Family Cites Families (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH0754564B2 (en) * | 1982-12-15 | 1995-06-07 | キヤノン株式会社 | Erasing device in recording or reproducing device |
JPS59142705A (en) * | 1983-02-02 | 1984-08-16 | Canon Inc | Erasing device of recording or reproducing device |
JPH01269260A (en) * | 1988-04-21 | 1989-10-26 | Fujitsu Ltd | Magneto-optical recording method |
JPH08249819A (en) * | 1995-03-10 | 1996-09-27 | Matsushita Electric Ind Co Ltd | Recording and reproducing device |
US5845319A (en) * | 1995-08-23 | 1998-12-01 | Fujitsu Limited | Disk array device which separates local and physical disks using striping and operation mode selection |
KR100190529B1 (en) * | 1996-08-12 | 1999-06-01 | 윤종용 | Computer system with vtr |
JPH11272562A (en) * | 1998-03-19 | 1999-10-08 | Toshiba Corp | Storage contents deletion method for computer system and storage medium |
JP2001092719A (en) * | 1999-09-21 | 2001-04-06 | Eco-Logistics Inc | Device and method for discarding information of storage device, storage medium and transmission medium |
JP2001184662A (en) * | 1999-12-24 | 2001-07-06 | Kenwood Corp | Recording/reproducing device for recording medium |
US6668305B1 (en) * | 2001-01-16 | 2003-12-23 | Sun Microsystems, Inc. | Method and apparatus for the staggered startup of hard disk drives |
JP3976227B2 (en) * | 2001-06-18 | 2007-09-12 | 日立ソフトウエアエンジニアリング株式会社 | Terminal data erasure management method and program. |
US20040243734A1 (en) * | 2003-05-26 | 2004-12-02 | Canon Kabushiki Kaisha | Information processing apparatus, method of controlling the same, control program, and storage medium |
JP2005149614A (en) * | 2003-11-14 | 2005-06-09 | Orient Sokki Computer Kk | Method for disposing of data recording medium |
US7509452B2 (en) * | 2004-01-19 | 2009-03-24 | Ricoh Company, Ltd. | Image forming apparatus, erasing method, and hard disk management method |
JP4212503B2 (en) * | 2004-03-30 | 2009-01-21 | シャープ株式会社 | Control system, control device, storage device, and computer program |
US7301886B2 (en) * | 2004-05-10 | 2007-11-27 | Hewlett-Packard Development Company, L.P. | Storage device having a read circuit to detect a storage state based on interaction between a probe and a storage medium |
-
2006
- 2006-10-19 WO PCT/US2006/040805 patent/WO2007047802A2/en active Application Filing
- 2006-10-19 US US11/583,150 patent/US7725674B2/en not_active Expired - Fee Related
- 2006-10-19 RU RU2008120022/09A patent/RU2008120022A/en not_active Application Discontinuation
- 2006-10-19 JP JP2008536785A patent/JP2009512968A/en active Pending
- 2006-10-19 EP EP06826239A patent/EP1952248A4/en not_active Withdrawn
- 2006-10-19 CA CA002666963A patent/CA2666963A1/en not_active Abandoned
- 2006-10-19 CN CNA2006800477207A patent/CN101331467A/en active Pending
-
2008
- 2008-04-17 IL IL190950A patent/IL190950A0/en unknown
-
2010
- 2010-05-11 US US12/777,321 patent/US20100220572A1/en not_active Abandoned
-
2012
- 2012-06-18 US US13/525,770 patent/US20120303920A1/en not_active Abandoned
Patent Citations (34)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4494156A (en) * | 1982-05-14 | 1985-01-15 | Media Systems Technology | Selectable format computer disk copier machine |
US4984225A (en) | 1987-03-31 | 1991-01-08 | Kabushiki Kaisha Toshiba | System for applying magnetic field to opto-magnetic memory |
US4932522A (en) | 1989-09-21 | 1990-06-12 | Milovich Steven L | CD storage with automatic opening device |
US5056081A (en) | 1990-01-02 | 1991-10-08 | Tandy Corporation | System and method for erasing light-responsive optical disks |
US5206843A (en) | 1990-07-31 | 1993-04-27 | Kabushiki Kaisha Toshiba | Apparatus for erasing information recorded on an information recording medium by applying light and a magnetic field over a plurality of recording tracks |
US5375243A (en) * | 1991-10-07 | 1994-12-20 | Compaq Computer Corporation | Hard disk password security system |
JPH08129864A (en) * | 1994-10-28 | 1996-05-21 | Meisei Electric Co Ltd | Loading structure and device structure for equipment unit |
US5652695A (en) * | 1995-05-05 | 1997-07-29 | Dell Usa, L.P. | Hard drive carrier design permitting floating retention of a connector assembly to facilitate blind mating of the connector assembly in a hard drive bay |
US5721665A (en) | 1995-08-18 | 1998-02-24 | Data Security, Inc. | Modulated magnet field bulk degaussing system |
USD382861S (en) * | 1996-03-15 | 1997-08-26 | Micronet Technology, Inc. | Housing for removable computer storage modules |
US6076142A (en) * | 1996-03-15 | 2000-06-13 | Ampex Corporation | User configurable raid system with multiple data bus segments and removable electrical bridges |
US6351374B1 (en) * | 1996-08-19 | 2002-02-26 | Raymond C. Sherry | Removable hard disk drive module |
US6131141A (en) | 1996-11-15 | 2000-10-10 | Intelligent Computer Solutions, Inc. | Method of and portable apparatus for determining and utilizing timing parameters for direct duplication of hard disk drives |
US6570727B1 (en) | 1997-04-30 | 2003-05-27 | International Business Machines Corporation | Method and apparatus for erasing information from a disk within a magnetic disk drive using an externally generated magnetic field |
US6070228A (en) * | 1997-09-30 | 2000-05-30 | International Business Machines Corp. | Multimedia data storage system and method for operating a media server as a cache device and controlling a volume of data in the media server based on user-defined parameters |
US6142796A (en) * | 1999-06-08 | 2000-11-07 | Behl; Sunny | Collapsible hard disk drive docking adapter |
US20010051963A1 (en) * | 2000-03-22 | 2001-12-13 | Shinichi Nishikawa | Network print system |
US20020042919A1 (en) * | 2000-05-25 | 2002-04-11 | Sturza Mark Alan | Method for utilizing excess communications capacity |
US6651192B1 (en) | 2000-11-30 | 2003-11-18 | Western Digital Technologies, Inc. | Method and system for testing reliability attributes in disk drives |
US20020078026A1 (en) * | 2000-12-14 | 2002-06-20 | Fergus Joseph E. | Method and apparatus for bulk data remover |
US20020112034A1 (en) * | 2001-02-11 | 2002-08-15 | Ulrich Feik | Method for administering certification data |
US20020129257A1 (en) * | 2001-03-07 | 2002-09-12 | Diebold, Incorporated | Automated transaction machine digital signature system and method |
US20020196572A1 (en) * | 2001-06-21 | 2002-12-26 | Steven Bress | Systems and methods for removing data stored on long-term memory devices |
US20030074576A1 (en) * | 2001-10-17 | 2003-04-17 | Kelly Thomas W. | Positive disconnect device for networked computer |
US20030103288A1 (en) * | 2001-11-30 | 2003-06-05 | Kabushiki Kaisha Toshiba | Recording and regeneration apparatus and data erasure method for use in the recording and regeneration apparatus |
US20050141118A1 (en) | 2002-03-14 | 2005-06-30 | Tomoaki Ito | Recorded data deleting device for hard disk |
US20040051989A1 (en) | 2002-09-17 | 2004-03-18 | Fujitsu Limited | Data erasing device using permanent magnet |
US20050219732A1 (en) | 2002-12-09 | 2005-10-06 | Orient Instrument Computer Co., Ltd. | Device and method for erasing recorded data of magnetic storage |
US20060023389A1 (en) | 2002-12-09 | 2006-02-02 | Tomoaki Ito | Recorded data erasing device of magnetic storage |
US20040252628A1 (en) | 2003-03-18 | 2004-12-16 | Roger Detzler | Dead on demand disk technology |
US7027249B2 (en) | 2003-08-20 | 2006-04-11 | Fujitsu Limited | Data erasing apparatus |
US20050082182A1 (en) | 2003-10-15 | 2005-04-21 | Mcbrady Mark S. | Storage device for compact disk box |
US20050200885A1 (en) * | 2004-02-26 | 2005-09-15 | Matsushita Electric Industrial Co., Ltd. | Multifunction apparatus |
US20050237563A1 (en) * | 2004-04-21 | 2005-10-27 | Sharp Kabushiki Kaisha | Data processing apparatus and image forming apparatus |
Non-Patent Citations (3)
Title |
---|
Gutmann, Peter, "Secure Deletion of Data from Magnetic and Solid-State Memory," Jul. 1996, Sixth USENIX Security Symposium Proceedings. * |
International Preliminary Report on Patentability and Written Opinion, May 2, 2008. |
International Search Report dated Nov. 26, 2007. |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080201661A1 (en) * | 2007-02-03 | 2008-08-21 | Stec, Inc. | Remote flash storage management |
US20100262817A1 (en) * | 2009-04-09 | 2010-10-14 | Dell Products L.P. | User selectable data wipe |
US8145891B2 (en) * | 2009-04-09 | 2012-03-27 | Dell Products L.P. | Bios-selectable data wiping system |
US9454355B2 (en) | 2010-07-15 | 2016-09-27 | Dell Products L.P. | Information handling system image restoration |
US9007961B2 (en) | 2010-11-22 | 2015-04-14 | May Patents Ltd. | Apparatus and method for using and solving linear programming problem and applications thereof |
Also Published As
Publication number | Publication date |
---|---|
IL190950A0 (en) | 2009-09-22 |
EP1952248A2 (en) | 2008-08-06 |
CN101331467A (en) | 2008-12-24 |
WO2007047802A2 (en) | 2007-04-26 |
US20120303920A1 (en) | 2012-11-29 |
EP1952248A4 (en) | 2012-03-07 |
JP2009512968A (en) | 2009-03-26 |
US20070101055A1 (en) | 2007-05-03 |
CA2666963A1 (en) | 2007-04-26 |
RU2008120022A (en) | 2009-11-27 |
US20100220572A1 (en) | 2010-09-02 |
WO2007047802A3 (en) | 2008-01-31 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7725674B2 (en) | Hard drive eraser | |
US9244627B2 (en) | Secure data erasure system for erasing a plurality of data storage devices | |
Kissel et al. | Guidelines for media sanitization | |
US7124301B1 (en) | Data protection method for a removable storage medium and a storage device using the same | |
US20040243734A1 (en) | Information processing apparatus, method of controlling the same, control program, and storage medium | |
US9195858B2 (en) | Encrypted data storage device | |
CN100405249C (en) | Information processing apparatus, information processing method, and program storage medium | |
US20080235809A1 (en) | Restricted erase and unlock of data storage devices | |
JP4576336B2 (en) | Electronic data management apparatus, control program therefor, and electronic data management method | |
US7228379B2 (en) | Systems and methods for removing data stored on long-term memory devices | |
JP2006251857A (en) | Method for restricting i/o access of client and program and system | |
CN106716333B (en) | Method for completing secure erase operation | |
US9223515B2 (en) | Devices and methods for device-mapping connectivity hub | |
US20060087760A1 (en) | Simple method of protecting customer data on hard drives returned from the field | |
Jansen et al. | Guidelines on PDA forensics | |
GB2323951A (en) | Password processing | |
EP1850264A1 (en) | Data management method using external recording medium write device and data management system | |
White | Apple Training Series: Mac OS X Support Essentials | |
JPH08203257A (en) | Card-type hard disk apparatus and data-processing apparatus using the apparatus | |
Koreneff et al. | Information technology | |
Nikkel | Forensic acquisition and analysis of magnetic tapes | |
Davies et al. | Hard disk storage: firmware manipulation and forensic impact and current best practice | |
Jansen et al. | SP 800-72. Guidelines on PDA Forensics | |
Orvis | CIAC-2325 | |
Roberts | Data Remanence in New Zealand |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: ENSCONCE DATA TECHNOLOGY, INC.,NEW HAMPSHIRE Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:THORSEN, JACK D.;REEL/FRAME:018795/0767 Effective date: 20061110 Owner name: ENSCONCE DATA TECHNOLOGY, INC., NEW HAMPSHIRE Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:THORSEN, JACK D.;REEL/FRAME:018795/0767 Effective date: 20061110 |
|
AS | Assignment |
Owner name: SAGE ADVISORS, INC., MASSACHUSETTS Free format text: SECURITY AGREEMENT;ASSIGNOR:ENSCONCE DATA TECHNOLOGY, INC.;REEL/FRAME:023056/0727 Effective date: 20090730 Owner name: SAGE ADVISORS, INC.,MASSACHUSETTS Free format text: SECURITY AGREEMENT;ASSIGNOR:ENSCONCE DATA TECHNOLOGY, INC.;REEL/FRAME:023056/0727 Effective date: 20090730 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
FPAY | Fee payment |
Year of fee payment: 4 |
|
FEPP | Fee payment procedure |
Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.) |
|
FEPP | Fee payment procedure |
Free format text: 7.5 YR SURCHARGE - LATE PMT W/IN 6 MO, SMALL ENTITY (ORIGINAL EVENT CODE: M2555) |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YR, SMALL ENTITY (ORIGINAL EVENT CODE: M2552) Year of fee payment: 8 |
|
FEPP | Fee payment procedure |
Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY |
|
LAPS | Lapse for failure to pay maintenance fees |
Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY |
|
STCH | Information on status: patent discontinuation |
Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362 |
|
STCH | Information on status: patent discontinuation |
Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362 |
|
FP | Lapsed due to failure to pay maintenance fee |
Effective date: 20220525 |